Passive assessments sniff the traffic present on the network to identify the working systems, network services, applications, and vulnerabilities.
a. true
b. false
Answer: a. true
Computer Science & Information Technology
You might also like to view...
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:
A. ARP cache poisoning B. IP spoofing C. amplified DNS attack D. evil twin
Computer Science & Information Technology
The ____________________ of a base class automatically makes the destructor of a derived class virtual.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology